Home | Amazing | Today | Tags | Publishers | Years | Search 
Advanced Statistical Steganalysis (Information Security and Cryptography)
Advanced Statistical Steganalysis (Information Security and Cryptography)

Steganography and steganalysis, the hiding and detection of a covert payload within an innocent cover object, started to receive attention from the computer science, engineering, and mathematics communities in the 1990s. At first the problems were not clearly defined, but proper statistical foundations were proposed and mathematical...

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

 

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments....

Computer Processing of Remotely-Sensed Images: An Introduction
Computer Processing of Remotely-Sensed Images: An Introduction

Environmental remote sensing is the measurement, from a distance, of the spectral features of the Earth’s surface and atmosphere. These measurements are normally made by instruments carried by satellites or aircraft, and are used to infer the nature and characteristics of the land or sea surface, or of the atmosphere, at the...

Crystallization Process Systems
Crystallization Process Systems

Crystallization from solution is a core technology in major sectors of the chemical process and allied industries. Crystals are produced in varying sizes ranging from as small as a few tens of nanometers to several millimetres or more, both as discrete particles and as structured agglomerates. Well- established examples include bulk...

Biomedical Applications of Proteomics
Biomedical Applications of Proteomics

In medicine, as in any other life sciences discipline, research should start by raising a question (hypothesis) to solve a problem. Then the scientist should select the most appropriated method(s) to answer the question and solve the dilemma. The obtained intermediate and final results may answer the question or may raise additional...

Analytical Characterization of Aluminum, Steel, and Superalloys
Analytical Characterization of Aluminum, Steel, and Superalloys

The Analytical Characterization of Aluminum, Steel, and Superalloys addresses the needs of the practicing materials scientist and engineer, whether in an industrial or university setting, and the advanced student. This handbook provides a fundamental overview of a wide range of characterization methodologies and does not provide an...

Software Reliability Methods (Texts in Computer Science)
Software Reliability Methods (Texts in Computer Science)

This book presents current methods for dealing with software reliability, illustrating the advantages and disadvantages of each method. The description of the techniques is intended for a non-expert audience with some minimal technical background. It also describes some advanced techniques, aimed at researchers and practitioners in software...

Graph-Theoretic Concepts in Computer Science: 37th International Workshop, WG 2011
Graph-Theoretic Concepts in Computer Science: 37th International Workshop, WG 2011

The 37th International Workshop on Graph-Theoretic Concepts in Computer Science (WG 2011) took place in Tepl´a Monastery, Czech Republic, during June 21–24, 2011. It was attended by 80 participants who came from all over the world not only to deliver or listen to interesting talks, but also to celebrate the 65th birthday of Ludek...

Computer Science: The Hardware, Software and Heart of It
Computer Science: The Hardware, Software and Heart of It

Computer Science: The Hardware, Software and Heart of It focuses on the deeper aspects of the two recognized subdivisions of Computer Science, Software and Hardware. These subdivisions are shown to be closely interrelated as a result of the stored-program concept. Computer Science: The Hardware, Software and Heart of It includes certain...

Java Programming 24-Hour Trainer (Wrox Programmer to Programmer)
Java Programming 24-Hour Trainer (Wrox Programmer to Programmer)
It doesn’t take a rocket scientist to notice the recent serious decline in the publishing of computer books, to say nothing of computer magazines. I enjoy reading books about software and visit the nearby Barnes and Noble at least twice a month. During the last three years the number of bookcases dedicated to computer books...
Logic of Analog and Digital Machines
Logic of Analog and Digital Machines
Computer Science is a very young discipline compared to most others. Alan Turing published the seminal paper of the field in 1936. Around the same time, the militaries in Germany, UK, and US commissioned the first digital electronic computer projects. One of these, the Colossus at Bletchley Park in the UK, was used to break the...
Marine Biofouling: Colonization Processes and Defenses
Marine Biofouling: Colonization Processes and Defenses

Recent instances of bioinvasion, such as the emergence of the zebra mussel in the American Great Lakes, generated a demand among marine biologists and ecologists for groundbreaking new references that detail how organisms colonize hard substrates, and how to prevent damaging biomass concentrations.

Marine Biofouling:
...

Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy